* New security upstream release: 1.1.15 (LP: #309655)
- CVE-2009-0040: Upgrade PNG library to fix memory safety hazard
- CVE-2009-0352: Crashes with evidence of memory corruption (rv:1.9.0.6)
- CVE-2009-0357: XMLHttpRequest allows reading HTTPOnly cookies
- CVE-2009-0771: Crashes with evidence of memory corruption (rv:1.9.0.7)
- CVE-2009-0776: XML data theft via RDFXMLDataSource and cross-domain redirect
This bug was fixed in the package seamonkey - 1.1.15+ nobinonly- 0ubuntu0. 8.04.2
--------------- nobinonly- 0ubuntu0. 8.04.2) hardy-security; urgency=low
seamonkey (1.1.15+
* CVE-2009-1044: Arbitrary code execution via XUL tree element patches/ 90_181_ 484320_ attachment_ 368977. patch patches/ series 485217_ attachment_ 369357. patch patches/ 90_181_ 485286_ attachment_ 369457. patch
- add debian/
- update debian/
* CVE-2009-1169: XSL Transformation vulnerability
- add 90_181_
- add debian/
seamonkey (1.1.15+ nobinonly- 0ubuntu0. 8.04.1) hardy-security; urgency=low
* New security upstream release: 1.1.15 (LP: #309655)
- CVE-2009-0040: Upgrade PNG library to fix memory safety hazard
- CVE-2009-0352: Crashes with evidence of memory corruption (rv:1.9.0.6)
- CVE-2009-0357: XMLHttpRequest allows reading HTTPOnly cookies
- CVE-2009-0771: Crashes with evidence of memory corruption (rv:1.9.0.7)
- CVE-2009-0776: XML data theft via RDFXMLDataSource and cross-domain redirect
seamonkey (1.1.14+ nobinonly- 0ubuntu0. 8.04.1) hardy-security; urgency=low
* New security upstream release: 1.1.14 (LP: #309655) 5501..5500: Crashes with evidence of memory corruption rv:1.9. 0.5/1.8. 1.19) patches/ 35_zip_ cache.patch patches/ series
- CVE-2008-5511: XSS and JavaScript privilege escalation
- CVE-2008-5510: Escaped null characters ignored by CSS parser
- CVE-2008-5508: Errors parsing URLs with leading whitespace and control ch$
- CVE-2008-5507: Cross-domain data theft via script redirect error message
- CVE-2008-5506: XMLHttpRequest 302 response disclosure
- CVE-2008-5503: Information stealing via loadBindingDocument
- CVE-2008-
(
* drop patches applied upstream
- delete debian/
- update debian/
-- Alexander Sack <email address hidden> Tue, 31 Mar 2009 13:21:19 +0200